Applying Trust in Mobile and Wireless Networks

  • Dagmara Spiewak
  • Thomas Engel


Trust Model Target Node Malicious Node Trust Third Party Action String 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abduhl-Rahman A, Hailes S (1997) A distributed trust model. In: Workshop on New security paradigms. United Kingdom, pp 48–60Google Scholar
  2. 2.
    Awerbuch MB, Curtmola R, Holmer D, Nita-Rotau Cristina, Rubens Hubert (2004) Mitigating Byzantine Attacks in Ad Hoc Wireless Networks. In: Technical Report Version 1Google Scholar
  3. 3.
    Awerbuch MB, Holmer D, Rubens Hubert (2004) Swarm Intelligence Routing Resilient to Byzantine Adversaries. In: International Zurich Seminar on Communications. pp 160–163Google Scholar
  4. 4.
    Blaze M, Feigenbaum J, Lacy J (1996) Decentralized Trust Management. In: IEEE Symposium for Security and Privacy. USA: 96-17: 164Google Scholar
  5. 5.
    Buchegger S, Le Boudec JY (2005) Self-Policing Mobile Ad-Hoc Networks by Reputation. In: IEEE Communication Magazine. USA: 43-7: 101–107Google Scholar
  6. 6.
    Chun B, Bavier A (2005) Decentralized Trust Management and Accountability in Federated Systems. In: 37th Annual Hawaii International Conference on System Sciences. USAGoogle Scholar
  7. 7.
    Douceur JR (2002) The Sybil Attack. In: IPTP02 Workshop. Cambridge, MA, USAGoogle Scholar
  8. 8.
    Ertaul L, Chavan N (2005) Security of Ad Hoc Networks and Threshold Cryptography. In: International Conference on Wireless Networks, Communications, and Mobile Computing (WirelessCom). USA: pp 69–74Google Scholar
  9. 9.
    Ertaul L, Weimin L (2005) ECC Based Threshold Cryptography for Secure Data Forwarding and Security Key Exchange in MANET (I). In: NETWORKING 2005. LNCS Berlin: 3462/2005: pp 102–113Google Scholar
  10. 10.
    Eschenauer L, Gligor VD, Baras JS (2002) On trust establishment in mobile ad-hoc networks. In: LNCS Berlin: 2845/2003: pp 47–66Google Scholar
  11. 11.
    Hu YC, Perrig A, Johnson DB (2002) Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Wireless Networks. Springer Netherlands: vol 11, 2005: pp 21–38Google Scholar
  12. 12.
    Hu YC, Perrig A, Johnson DB (2003) Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Network. In: IEEE INFOCOM 2003. USA: vol 3, pp 1976–1986Google Scholar
  13. 13.
    Hu YC, Perrig A, Johnson DB (2003) Rushing Attacks and Defense in Wireless Ad Hoc Networks. In: ACM Workshop on Wireless Security. USA: pp 30–40Google Scholar
  14. 14.
    Hubaux JP, Buttyan L, Capkun S (2001) The Quest for Security in Mobile Ad Hoc Networks. In: 2nd ACM international symposium on Mobile ad hoc networking & computing. USA: pp 146–155Google Scholar
  15. 15.
    Jiang T, Baras J (2004) Ant-based Adaptive Trust Evidence Distribution in MANET. In: 2nd International Workshop on Mobile Distributed Computing. USA: pp 588–593Google Scholar
  16. 16.
    Jiang T, Baras J (2004) Cooperative Games, Phase Transition on Graphs and Distributed Trust MANET. In: 43rd IEEE Conference on Decision and Control. BahamasGoogle Scholar
  17. 17.
    Jøsang A (1999) An Algebra for Assessing Trust in certification Chains. In: Network and Distributed Systems Security Symposium (NDSS 99). The Internet Society. USAGoogle Scholar
  18. 18.
    Jøsang A, Keser C, Dimitrakos T (2005) Can We Manage Trust? In: LNCS Berlin: 3477/2005 pp 93–107Google Scholar
  19. 19.
    Lamsal P (2001) Understanding Trust and Security. In: Department of Computer Science. University of Helsinki. FinlandGoogle Scholar
  20. 20.
    Lauter K (2004) The Advantages of Elliptic Curve Cryptography for Wireless Security. In: IEEE Wireless Communications. USA: vol 11 pp 62–67Google Scholar
  21. 21.
    Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc networks. In: 27th Australasian conference on Computer science. New Zealand: vol 26 pp 47–54Google Scholar
  22. 22.
    Ramaswamy S, Fz H, Sreekantaradhya M, Dixon J, Nygard K (2003) Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Network. In: International Conference on Wireless Networks. USA: pp 570–575Google Scholar
  23. 23.
    Sanzgiri K, Dahill B, Levine B, Belding-Royer E (2002) A secure routing protocol for ad hoc networks. In: International Conference on Network Protocols. FranceGoogle Scholar
  24. 24.
    Spiewak D, Engel T, Fusenig V (2007) Unmasking Threats in Mobile Wireless Network Settings. In: WSEAS Transactions on Communications vol 6 pp 104–110Google Scholar
  25. 25.
    Theodorakopoulos G, Baras J (2004) Trust Evaluation in Ad-Hoc Networks. In: ACM workshop on Wireless security. USA: pp1–10Google Scholar
  26. 26.
    Zhou L, Haas ZJ (1999) Securing Ad Hoc Networks. In: IEEE Network special issue on network security. USA: 13(6): 2430Google Scholar
  27. 27.
    Zimmermann PR (1995) The Official PGP User’s Guide. MIT Press USAGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Dagmara Spiewak
    • 1
  • Thomas Engel
    • 1
  1. 1.SECAN-LabUniversity of LuxembourgL-1359 Luxembourg

Personalised recommendations